DLL Injection And Process Hollowing Detection in Pest Code Analysis
In forensic information examinations, computers that are thought to have been compromised by a malicious code sometimes come out, and we are expected to detect …
Knowledge pool for Information Technologies
In forensic information examinations, computers that are thought to have been compromised by a malicious code sometimes come out, and we are expected to detect …
DLL (dynamic link library) is the Windows library file used by a program to call existing functions. DLL Injection is a technique used to manipulate the …
Ping / ICMP requests are the most common tools used to determine whether a device is active in the network. When installing the Windows Server …
The Kms.exe (Key Management Server) file is a file called Windows 8.1 Activator which belongs to a tool that activates Windows with illegal methods. As …
Sysmon (System Monitor) is one of its tools to monitor activities on Windows operating systems in detail. It provides detailed information on the created processes, …
Active Directory is a directory service designed by Microsoft specifically for Windows Server and Client computer systems, which contains information such as a server, client …
For Active Directory to transfer data between different locations efficiently, a system that can be modelled according to your physical network is needed. The Sites …
In the current information technology environment, server, application and network devices are monitored by many monitoring applications. Although applications can monitor, monitoring and reporting of …
After using the weaknesses of a machine, exploiting that machine and buying a meterpreter shell, I will talk about the mimetic module and its use …
DEP (Data Execution Prevention) is a security feature that comes with Windows XP SP2. It prevents some unauthorized codes from running on certain memory sections …